Most recent

Tom Skeen

Tom Skeen
Tom Skeen provides guidance on matters relating to IT/Risk/Security challenges to the Safe-T Data leadership team and customers.

Recent Posts

State-Level Cybersecurity is Hard to Fix

By Tom Skeen May 3, 2018 Cyber Security

Let’s set the scene.

Back in 2015, an audit of the various departments making up the government of California showed that out of 77 agencies, 73 had failed to maintain compliance with reasonable security standards.

NotPetya Caused Maersk to Lose Hundreds of Millions in US Dollars

By Tom Skeen September 1, 2017 cyberattack, Ransomware
The world’s largest container ship and supply vessel operator, Maersk, announced last week that it has suffered hundreds of millions in U.S. dollar losses from the ransomware attack, “ NotPetya ”. 

Everything You Need to Know About the Swedish Data Leak

By Tom Skeen August 8, 2017 Data Breach

Nothing is more scarring than the possibility of having your personal data fall into the wrong hands. The impact seems even more callous when the cause behind the breach is not a malicious virus, or a mystery hacker from a far away land, but rather from an oversight by an institution that you’d think would be good at following its own laws- The Government.

Do We Have to Hire a Data Protection Officer? Understanding the Role of the DPO

By Tom Skeen July 12, 2017 data protection, GDPR

The European Union's General Data Protection Regulation (GDPR) is coming up in less than a year, and many of its requirements are not quite clear. A good example of this is the responsibility for companies to hire a Data Protection Officer. This may engender a few questions, such as:

GoldenEye “NotPetya” Ransomware Is Disrupting The Globe With Irreversible Damage

It’s not just the physical world that’s volatile; the cyber world isn’t safe either. Just barely a month after Wannacry ransomware shook up the cyber ecosystem, there was another cybersecurity epidemic that wreaked global havoc on June 27th.

This time it’s Petya, or is it NotPetya... or maybe GoldenEye...

How Have Technology Security Budgets Changed?

The days of no funding or insufficient funding being allocated to technology security budgets, to prevent cyber attacks, information compromise and ransom, are long gone. 

How to Secure Legal Records from Cyber Hackers

It’s no mystery that companies and individuals are hacked every day and information is compromised. Criminals use this information in many ways and one of them is to profit from it in the global markets violating insider trading laws.

Filling the Gap In Law Firm Security

It’s no secret that law firms hold a massive amount of confidential client data. And with the dramatic growth and usage of cloud computing, the need to secure the transmission and sharing of this data is becoming more important than ever.

10 Ways To Secure Legal Documents

All companies have a responsibility to secure client documents, but the legal professional has an extended ethical obligation. Your legal professional has some of your most personal and business information and they must be diligent with security and securing legal documents.  


Get Email Updates

Sign up for our monthly newsletter and latest blog posts....keep up to date on the latest security data news!

Contact Us: